O'Reilly logo

Splunk 7 Essentials - Third Edition by Betsy Page Sigman, Erickson Delgado, J-P Contreras

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How does the HEC work?

HTTP and HTTPS events can be created and delivered by web applications containing event metadata, such as time, host, and source, as well as other event data, found in the event key. The HEC makes it easy for app developers to add a minimal amount of code to their applications to send this data to Splunk. This is all done in a secure and efficient way, making it easy for application developers to be able to Splunk their application event data.

Typically, an application generates its own log file or uses Document Object Model (DOM) tagging to generate some relevant functional metrics. This is useful and still applicable to traditional multi-page web applications. However, web page development has moved forward in recent ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required